Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Maryline LaurentTelecom SudParisVerified email at telecom-sudparis.eu
- Sana BelguithLecturer in Cyber Security and Applied Cryptography, University of Bristol UKVerified email at bristol.ac.uk
- Giovanni RusselloProfessor and Head of School of Computer Science, University of AucklandVerified email at auckland.ac.nz
- Abderrazak JEMAIInstitut National des Sciences Appliquées et de TechnologieVerified email at insat.rnu.tn
- Hassan N. NouraUniversity of Franche-ComtéVerified email at univ-fcomte.fr
- Ali ChehabProfessor & Chair of ECE Department, American University of BeirutVerified email at aub.edu.lb
- Ola SalmanDeepVuVerified email at deepvu.co
- Mohammad Hammoudeh, Aramco Cy...King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
- Dr. Eng. Mohamad MalliCEO of boxMind.aiVerified email at boxMind.ai
- Joaquin Garcia-AlfaroSAMOVAR, Telecom SudParis, Institut Polytechnique de ParisVerified email at ieee.org
- Aymen BoudguigaCEAVerified email at cea.fr
- Mohamed MohamedAppleVerified email at wethink.info
- Tooska DargahiSenior Lecturer in Cybersecurity, Manchester Metropolitan University, UKVerified email at mmu.ac.uk
- Pierre-Olivier RocherIngénieur de recherche, Télécom SudParisVerified email at telecom-sudparis.eu
- Christophe KiennertTélécom SudParisVerified email at telecom-sudparis.eu
- Ashish GehaniSRIVerified email at sri.com
- Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
- Nicolas SklavosComputer Engineering and Informatics Department (CEID), University of Patras, GreeceVerified email at upatras.gr
- Nazatul Haque SultanResearch ScientistVerified email at data61.csiro.au
- Ferdous Ahmed BarbhuiyaProfessor, Indian Institute of Information Technology GuwahatiVerified email at iiitg.ac.in